0% found this document useful (0 votes)
17 views

Networking Concepts

Uploaded by

KuDu Is Here
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Networking Concepts

Uploaded by

KuDu Is Here
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

Chapter 5: Networking

Concepts

IT Essentials v7.0
Chapter 5 - Sections & Objectives
 5.1 Network Components and Types
• Explain components and types of computer networks.
• Describe the types of networks.
• Describe internet connection types.
 5.2 Network Protocols, Standards, and Services
• Explain networking protocols, standards and services.
• Explain the purpose and characteristics of transport layer protocols.
• Explain the significance of application port numbers.
• Explain wireless protocols.
• Explain network services.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 5 - Sections & Objectives (Cont.)
 5.3 Network Devices
• Explain the purpose of devices on a network.
• Explain basic network devices.
• Explain security devices.
• Explain other network devices.
 5.4 Network Cables
• Explain the characteristics of network cables.
• Describe networking tools and their purpose.
• Explain the purpose and characteristics of common types of copper network cables and connectors.
• Explain the purpose and characteristics of common types of fiber network cables and connectors.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
5.1 Network Components
and Types

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Types of Networks
Network Icons

Network Media Icons

Intermediary Device Icons Host Device Icons

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Types of Networks
Network Topologies and Description
 PAN (personal area network) – Commonly uses
Bluetooth to connect mice, keyboards, phones, and
tablets.

 LAN (local area network) – A wired network


consisting of a switch and network devices in a
limited geographical area.

 VLAN (virtual LAN) – Extends beyond a traditional


LAN and groups users based on administratively
defined boundaries such as department or floor.

 WLAN (wireless LAN) – Connects multiple wireless


devices and uses an access point.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Types of Networks
Network Topologies and Description
 WMN (wireless mesh network) – Connects
multiple wireless access points together to expand
the wireless network.

 MAN (metropolitan area network) – A network that


spans a city.

 WAN (wide area network) – A network that spans a


large geographical area.

 VPN (virtual private network) – A method of


connecting to a network such as a company
network across an unsecure network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Internet Connection Types
Brief History of Connection Technologies
 Analog telephone access (dialup) – uses an
analog modem to call another modem.
 ISDN (Integrated Services Digital Network) – more
bandwidth than dialup. Can carry voice, video, and
data.

 Broadband – uses different frequencies to send


multiple signals over media.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Internet Connection Types
DSL, Cable, and Fiber
 DSL (digital subscriber line) – always on
technology that uses phone lines; voice and data
carried on different frequencies; requires a filter on
the port that connects to a phone.

 Cable – Uses a cable modem to connect to a


traditional cable TV network; shares the network
with multiple subscribers.

 Fiber – High bandwidth connection used in


backbone networks, large enterprise environments,
large data centers, and now part of some home
internet connections.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Internet Connection Types
Line of Sight Wireless Internet Service
 Line of site wireless – always on technology that uses radio signals for connecting to the
internet.
• Clear path required
• Weather affects signal strength and performance

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Internet Connection Types
Satellite
 Satellite – broadband technology for remote areas
• Uses a satellite dish
• Not a good solution for time-sensitive applications like gaming, Voice over Internet
Protocol (VoIP), and video conferencing

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Internet Connection Types
Cellular
 Cellular– relies on cell towers to create a network used by cell phones and
connectivity to the internet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Internet Connection Types
Mobile Hotspot and Tethering
 Cell phone option that allows another device to connect to the
internet using Wi-Fi, Bluetooth, or USB cable
• The other device is using the phone’s cellular connection to
connect to the internet
• Called tethering or a hotspot
 A mobile hotspot is when a cell phone allows Wi-Fi devices to
connect and use the mobile data network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
5.2 Networking Protocols,
Standards, and Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Video Explanation – Transport Layer Protocols
Transport Layer Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Transport Layer Protocols
The TCP/IP Model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Transport Layer Protocols
TCP
 Three basic operations of reliability
• Numbering and tracking of data segments
• Acknowledgment of received data
• Retransmitting any unacknowledged data after a
period of time.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Transport Layer Protocols
UDP
 Very little overhead or data checking

 Best-effort delivery protocol (unreliable)


• No acknowledgment that the data is received by the destination

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Transport Layer Protocols
Video Explanation – Application Port Numbers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Application Port Numbers
Classify Application Port Numbers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Application Port Numbers
Classify Application Port Numbers (Cont.)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wireless Protocols
WLAN Protocols

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wireless Protocols
Bluetooth, NFC, and RFID
 Bluetooth
• Up to 7 devices to create a PAN
• 802.15.1
• 2.4 to 2.485 GHz radio frequency range

 RFID
• Passive or active tags used to identify items
• Passive – rely on RFID reader to activate and read
• Active – have a battery to broadcast the ID up to
100 meters
• 125 MHz to 960 MHz radio frequency range

 NFC (Near Field Communication)


• Devices must be in close proximity to exchange
data
• Used for payments, printing, public parking, etc.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Wireless Protocols
Zigbee and Z-Wave
 Zigbee
• Requires a ZigBee Coordinator to manage client
devices connected in a wireless mesh network.
• Devices commonly managed from a cell phone
app
• IEEE 802.15.4 standard
• 868 MHz to 2.4 GHz range up to 20 meters,
65,000 devices, and data speeds up to 250 kb/s
 Z-Wave
• Proprietary standard, but public version available
• 232 devices can connect to a wireless mesh
network with data speeds up to 100 kb/s.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Wireless Protocols
Cellular Generations
 1G/2G – First generation was analog calls only. 2G introduced digital voice, conference calls, and
caller ID with speeds less than 9.6 Kb/s
 2.5G – supports web browsing, short audio and video clips with speeds up to 237 Kb/s.

 3G – full motion video and streaming music at speeds up to 2 Mb/s

 4G - IPv6, IP-based voice, gaming services, high quality multimedia at speeds up to 672 Mb/s

 LTE (Long Term Evolution) – means it meets the 4G speed standards and improves connectivity
while in motion. Speeds up to 100 Mb/s when mobile and up to 1 Gb/s when stationary.

 5G – supports augmented reality (AR), virtual reality (VR), smart homes, smart cars, and data
transfer between devices. Download speeds up to 3 Gb/s; upload speeds up to 1.5 Gb/s.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Network Services
Video Explanation – Network Services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Network Services
Client – Server Roles

 File Client and Server

 Web Client and Server

 Email Client and Server

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Network Services
DHCP Server
 A DHCP server provides IP addressing information.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Network Services
DNS Server
 A DNS server translates domain names such as cisco.com to an IP address.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Network Services
Print Server
 A print server
• Can control multiple printers
• Provides client access to print resources
• Allows centralized print job administration
• Provides feedback to network clients

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Network Services
File Server

 A file server allows clients to access


files using a specific protocol
• FTP (File Transfer Protocol)
• FTPS (File Transfer Protocol Secure)
• SFTP (Secure Shell File Transfer
Protocol)
• SCP (Secure Copy)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Network Services
Web Server

 A web server provides web


resources using these protocols
• Hypertext Transfer Protocol (HTTP)
• TCP port 80
• Secure HTTP (HTTPS)
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• TCP port 443

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Network Services
Mail Server

 Email messages are stored in


databases on mail servers
• Client communicates with server in
order to reach a different client
• Protocol used to send email
• Simple Mail Transfer Protocol (SMTP)
• Protocols used to retrieve email
• Post Office Protocol (POP)
• Internet Message Access Protocol (IMAP)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Network Services
Proxy Server
 Proxy servers act on behalf of a client, thus hiding the real internal host

 Used to cache frequently accessed web pages

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Network Services
Authentication Server
 Authentication, Authorization, and Accounting (AAA) - Allows access to a network
device or a particular network

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Network Services
Syslog Server
 Syslog stores network messages sent by networking devices.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
5.3 Basic Network Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Basic Network Devices
Video Explanation - Basic Network Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Basic Network Devices
Network Interface Card
 Todays computers have wired and/or wireless network capability.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Basic Network Devices
Repeaters, Bridges, and Hubs
 Repeaters – Also called
extenders because they
regenerate the signal so it can be
sent further.

 Hub – Receives data on one port


and sends to all other ports.
 Bridge – Divides a network into
two or more segments and tracks
which device is on each segment.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Basic Network Devices
Switches
 Ethernet switches record MAC
addresses for each device
connected to the switch.
• Data is sent to a specific device if
the MAC address of that device is
in the MAC address table.
• Managed switches are used in a
company environment and have
additional features.
• Unmanaged switches are used in
home or a small business
network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Basic Network Devices
Wireless Access Points

 Wireless access points (APs) – provide


access to a wireless network for a limited
range.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Basic Network Devices
Routers

 Routers connect networks.


• Use an IP address to forward traffic to other networks
• Can be a multipurpose device (integrated router) that includes switching and wireless capabilities

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Security Devices
Video Explanation – Security Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Security Devices
Firewalls
 A firewall protects data and
devices connected to a network.
 Firewalls use access control lists
(ACLs) which are rules used to
determine whether data is
permitted (allowed through) or
denied.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Security Devices
IDS and IPS
An Intrusion Detection System An Intrusion Prevention
(IDS) monitors traffic and is a System (IPS) actively monitors
passive system. traffic and takes action when
needed.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Security Devices
UTMs
 Universal Threat Management (UTM) is
an all-in-one security appliance. Features
are vendor-specific, but could include:
• Firewall services
• IDS/IPS services
• Additional security services against Zero
Day, Denial of Service (DoS) Distributed
Denial of Service (DDoS), and spyware
• Proxy and email filtering
• Network access control
• VPN services

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Security Devices
Endpoint Management Server
 An endpoint management server monitors end devices such as PCs, laptops, servers, tablets,
printers, etc.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Other Network Devices
Legacy and Embedded Systems
 A legacy system is a device on the network
no longer supported, but still in operation.
 An embedded system is a device built into
something else such as an appliance.
Embedded microchips are contained in
legacy systems and embedded systems.
 Legacy systems and embedded systems
could be a security risk.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Other Network Devices
Patch Panel

A centralized place where


network cables attach to the
back. Patch cables are used to
make a connection to another
patch panel which connects to a
different wiring closet, or to a
device such as a switch mounted
nearby.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Other Network Devices
Power over Ethernet and Ethernet over Power
 Power over Ethernet (PoE) is a standard PoE injector
for providing power to devices such as
APs, cameras, or IP phones through a
cable.

 A PoE injector can be connected to a


cable and a second cable is used to
connect a device that receives power from
the injector.

 Ethernet over Power (powerline


networking) uses existing electrical wiring
to create a network.

Network cable

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Other Network Devices
Cloud-based Network Controller
 A cloud-based network controller
is a remote device used to
manage network devices like
access points or switches.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
5.4 Network Cables

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Network Tools
Video Explanation – Network Cable Tools

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Network Tools
Network Tools and Descriptions

 Wire cutters or side cutters  Crimper – used to securely attach an RJ-45


connector

 Punch down tool – used to terminate wires into


 Wire strippers termination

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Network Tools
Network Tools and Descriptions (Cont.)

 Multimeter

 Cable Tester

 Tone Generator
 Wi-Fi analyzer

 Loopback adapter –
used to check a port

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Copper Cables and Connectors
Cable Types
 Cable types used in networking
• Twisted-pair
• Coaxial
• Fiber-optic

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Copper Cables and Connectors
Coaxial Cables
 Coaxial cable
• Copper or aluminum
• Used in cable TV systems and
satellite communication systems
• Harder to install, more expensive,
and harder to troubleshoot than
twisted-pair cabling

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Copper Cables and Connectors
Twisted-Pair Cables
 Twisted-pair cabling types
• Unshielded twisted-pair (UTP)
• Shielded twisted-pair (STP)
 UTP
• Most common UTP cabling
• Four pairs of color-coded wires
• Prone to electromagnetic interference
(EMI) and radio frequency
interference (RFI)
 STP
• Better protection against EMI and RFI
STP cabling
• More expensive and harder to install

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Copper Cables and Connectors
Twisted-Pair Category Ratings
Cat 5 UTP

Cat 5e UTP

Cat 6 UTP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Copper Cables and Connectors
Twisted-Pair Wire Schemes
T568A T568B

When creating a cable to


connect a network device to a
wall jack or from the patch
panel to a switch, make both
ends of the cable the same
standard.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Copper Cables and Connectors
Video Explanation – Build and Test a Network Cable

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Copper Cables and Connectors
Lab – Build and Test Network Cables

In this lab, you will build and test a straight-through Unshielded Twisted-Pair (UTP)
Ethernet network cable.

Note: With a straight-through cable, the color of wire used by pin 1 on one end is
the same color used by pin 1 on the other end, and similarly for the remaining
seven pins. The cable will be constructed using either TIA/EIA T568A or T568B
standards for Ethernet. This determines which color wire is to be used on each pin.
Straight-through cables are normally used to connect a host directly to a switch or
a wall plate in an office area.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Fiber Cables and Connectors
Fiber-Optic Cables
 Fiber-Optic cables
• Use light to transmit signals
• Not affected by EMI or RFI

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Fiber Cables and Connectors
Types of Fiber Media
 Single-mode fiber (SMF)
• Small core
SMF
• Uses laser technology to send one
beam of light
• Long distances
 Multimode fiber (MMF)
• Larger core
• Uses LEDs to send light
• Light is injected at different angles MMF
• Cheaper
• Bandwidth up to 10 Gb/s up to 550
meters

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Fiber Cables and Connectors
Fiber-Optic Connectors

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
5.5 Chapter Summary

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Conclusion
Chapter 5: Network Concepts

• Explain components and types of computer networks.


• Explain networking protocols, standards and services.
• Explain the purpose of devices on a network.
• Explain the characteristics of network cables.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68

You might also like